Education is a continuous process. All participants of the conference studied, studying now and will continue to study. An important milestone for anyone is the basic education in their professional area (which is in most cases is university), so we invite all participants to the panel…

During the last year I’ve talked a lot to IT managers and my fellow technical writers. Turns out that both sides often don’t know how a writer can be useful to the business, except just writing the docs. It hurts both sides: business has unresolved tasks and writers make less money…

Based on his many years of experience assisting with software product development and acquisition projects, practical recommendations will be given to developers on what shouldn’t be done in terms of borrowing knowledge and code.

We can definitely say that the full potential of Service Worker technology has not yet been revealed. The range their possibilities is much more than just smart cache, and this tech talk will be dedicated to an unusual approach of its usage.

This presentation describes expirience of our command in modifying MySQL Cluster to support IniniBand RDMA in nodes commutications. As an alternative view to horizontal scaling solution we developed working prototype that uses native RDMA interface which showed 25% performance increase (on used…

At first glance, an educated person engaged in the design and development of it systems, knows all about the practical side of thinking. In reality, even specialists with extensive experience make systematic mistakes. And when it comes to the team process, the situation worsens many…

Often the guidelines of the developer, supplier, purchaser and user SW-product are inconsistent, even worse, if they contradict each other. Possible shortcomings and damages, as well as their sources are given on examples of known systems and companies. Basic architectural approach helps to…

This presentation overviews tools and approaches for Application Performance Monitoring (APM) and Business Transactions Monitoring (BTM) of large multicomponent systems. The main goals of the talk are to raise awareness of an audience about a variety of possible solutions for monitoring tasks…

In our company CBT approaches are used, one of the tools is creation of value proposition. I must say that value propositions imply a lot of work of all departments, as it is not a slogan but concrete and measurable factors which are manifested in everyday work. During the presentation I will…

It projects inherit 2 problems of known types of architectures A and V of classification of VATI production systems. On the one hand, the limitation will always be at the beginning of the project in the development of the project architecture. On the other hand, it will always be at the end of…

My talk is about management of requirements specification practices — tools and notations for creating artifacts, understandable to different participants of the development; how to choose from a variety of tools the ones that suitable for your project. I will show how SEMAT Essence can help us…

The topic is largely unsolved, but definitely worth attention. On every corner now selling the “Blockchain”, the cryptocurrency courses are broadcast along with the oil price and the dollar… The audience will learn what really was behind all this, what drove people, whose…

I’ll speak about reasons, pros and cons of using different development methodologies (from Waterfall to Kanban) on different project stages. Basing on a payment system development project I’ll focus on changing methodologies, choosing the most appropriate one, and other practices,…

The seller’s dream is to sell as expensive as possible. The buyer’s dream is to buy as cheap as possible. How to make them both happy? Is it possible that highly qualified professionals could receive as much for their work as they deserve, and employers would pay for their services…

The presentation gives an idea of transformation of structured subject-related data to smooth-flowing coherent text. The transformation is based on a logical model that authors designed in order to explain what exactly makes text coherent. The model is implemented in a software tool that allows…

My talk will guide you on how to apply Russian standards GOST 19 and 34 on your project: why you may need them, which part of them is obviously outdated and which one is still valuable, how to use widely accepted artifacts and techniques along with GOST documentation.

Talk will cover differences in BI development while entire compay goes to microservice arhitecture. I will cover some aspects of data warehouse and data mart development, also covering trands in this area wich become actual in our case.

C# and F# manage to comprise the two paradigms seemingly in conflict with each other on a very deep level. How do we make it work for us? Do we pick a side or do we combine the principles from both worlds into a higher-level vision? The presentation focuses on real life enterprise application…

The sabotage analysis (diversionary analysis) is a method of improving technological processes, proposed by the future TRIZ Master B.L. Zlotin in the late 70-s of the last century. In the US and Western Europe, it is known under the brand Anticipatory Failure Determination (AFD) and is…

Most enterprise companies have been started DevOps transformation. I will share with you my thoughts about the pros and cons of this and try to make the question is it possible to start DevOps in an enterprise environment?

Bioinformatics happens to be one the fastest growing fields in terms of generating big data while still retaining a set of outdated software tools to deal with the enormous volume of data it produces. In this case, common sense does not support the situation with law of supply and demand as…

MegaM@Rt2 project is a collaborative initiative of the ECSEL Joint Undertaking under Horizon 2020 EU programme. The project regroups 26 partners from 6 different European countries who jointly address challenges of engineering modern cyber-physical systems by using model-based engineering…

If developers work in a startup, they most likely have to work with unclear requirements. And there is no dedicated analyst role in the team for sure. So they have to find out the details about each feature themselves. I will share my own experience of getting a feature description when you are…

Communication with difficult people, as well as crucial conversations, are one of the main sources of stress. This report covers practices of restoring your emotional condition and correcting ineffective mastered response patterns to people’s actions and words using internal self-changes…

This presentation describing experience of international research project called sdCloud in building and maintaining distributed development team and our approach in automation process that allows to provide regular releases of our platform to international research communities. Key focus of…

Affordable costs of BCI devices open new engine for UX research. This presentation will show hands-on experience of using an OpenBCI EEG interface to explore a person’s emotional response while reading texts.

In the present paper we discuss how text segmentation could be applied in the information retrieval domain. We assume that topic text segmentation allows one to better model text structure and therefore language itself, which influences the quality of text representation. We test the initial…

We have invented and created an approach, which allows experts from different projects to come to another project, explore working mode, principles, share experience, improve project processes and make a project more effective. It’s not even an audit…

The speech is dedicated to a corporate startups. That means the projects that are initiated and developed by the employees of the company. We will cover the themes, connected with risks, contradictions which can appear during the enteral startups implementation.

LeanKanban’s approach is based on a probabilistic approach to project, tasks, initiatives and improvements planning and forecasting. During my session, I will introduce this approach: identification of work item types, classes of service and defining SLAs.

Nowadays the distributed and remote teams’ topic is equally actual in the projects management as the change management challenge. This requires knowledge and different steps to make it working and effective.

The presentation goal is to share experience and tips for distributed and remote…

If your product grows and develops, then for sure you have a long list of ideas, how it can be improved or developed. Ideas can come from your users or be born within a project team. Ideas are always more than time and opportunity. How to choose the idea that will receive the greatest response…

In several steps we will draw the most popular schemes of automation solutions architecture, figure out what limitations if any, are applied to them by the popular automation approaches such as DDT, KDT, BDD, DSL and others

In my presentation, I’m going to give an overview of our three custom tools. Sherlock Bug helps to find out how the tasks similar to yours have been solved earlier. Revizor (Auditor) lets you know when the man-hours estimate is exceeded and informs you of the other deviations in the software…

Ability to create good documentation distinguishes software developer among competitors. Ability to do it effeciently, with reasonable efforts, is not so visible, but not less important, especially if software product is complex and customer is demanding.

The problem of constructing attribute grammar and syntactic-semantic interface for restoring chains of system calls generating some input tree of Linux processes is considered. An experimental comparison is made with the BPSF method presented on SEC(R) -2017, and the advantages of new proposed…

Authors present a methodology which allows computer scientists to create and process depersonalised medical data sets. The system being developed allows its users to collect, transform and process data from heterogeneous medical sources and to validate various hypothesis using medical data sets.

Configuration management tools strived to provide a declarative way to describe the desired state. This was achieved to some extent using Puppet manifests and Salt states, but they never worked good enough due to the imperative nature of systems to be configured. Kubernetes and Helm provide a…

In enterprise systems, data has been accumulating for years. And it seems a simple task-to configure the integration of the database sources in the database of your system. It would seem, what problems can be? Check the model of the system, do mapping. The catch is that everyone lies! There is…

To create great software from scratch and to turn big ball of legacy mud into a marble are completely different tasks. Many of us know how to create simple and robust interfaces, how to use the most effective and state of the art tools. But when faced against a huge product evolved through…

We share the lessons learned during a three year-long mobile game development project and discuss the QA techniques that turned out to be most efficient for us. We analyze how these activities address typical game-specific mobile development and testing issues, and why they can be recommended…

I’ll describe how such a tool as CCMS helps with content development not only to the technical documentation team, but also other departments of the company. You will learn the advantages of centralized implementation, and how it affects the organization of joint work of different departments…

In this report I will talk about the process of creating, localization and publishing documentation at developers.xsolla.com. This resource is intended to developers who want to integrate Xsolla solutions. I will also talk about tools and ways which we use to create, localize and deploy the…

Value proposition solves the root problem of the customer related to the acquisition of your services. The report, aimed at business owners and managers, product development managers, shows exactly how such development occurs on the example of developing a value proposition for an IT company.

Attendees of the presentation will learn about practical experience of selection of Cloud IoT platform for connection of specialized “smart” devices for one of the customer projects in MERA Company. Azure IoT platform has been chosen which offered optimal choice of capabilities but it did not…

For the past two years I have been leading the project of creating a C++ specialization on Coursera. The specialization is going to consist of five courses, three of which are already launched and another one is almost ready.

At the dawn of the Digital Age, every IT team member was supposed to have a project mindset: to relate his objectives to the project goal and to the activities of the others and to come to assistance if necessary. At that time, Fred Brooks compared a chief programmer team with a surgical team.…

I will tell you about my experience in development of scalable call-center solution based on Open Source components. I will describe evolution of architecture of the application with similar goal starting from the idea and finishing by production ready solution. We developed this solution in a…

In modern realities, the issue of software code quality is becoming more urgent. Static analysis tools are applied more often for eliminating bugs, security problems, and “code smells”. A centralized view of all warnings issued by various tools can become another pain in the…

In the report I will tell about the importance of the SAST (Static Application Security Testing) when developing secure, reliable applications and also about existing alternatives. Based on long-term experience of checking a large number of open source projects, I’ll tell about advantages…

In recent years, more and more teams are starting to use microservices in their projects. This is due to the fact that the business directly specifies in the requirements the possibility of scaling and highload already at the start of any, not even a very large project. But very often, teams…

During development of web services we are often faced with the issues of service availability for users. In my talk I want to show you the importance of user availability metrics and how to use them as the driver of development process. You will learn how to select indicators for measuring web…

SOLID stands for five principles of OOP intended to improve software reliability, extensibility and maintainability. The Symfony web framework is an excellent support to demonstrate each principle of SOLID: we will see how SOLID is beneficial for this framework that is easy to develop and…

The need to automate text data processing leads to the need of using computer linguistics tools in industrial systems of different kinds (document management systems, e-commerce, etc.), which imposes additional requirements on the means of automatic text processing.

In spite of the extensive efforts made by researchers and practitioners over the last fifty years, software engineering is still facing tremendous challenges. Several well-recognized software development paradigms have been studied and applied, but considerable difficulties and problems with…

During past years, the requirements for modern applications have increased from gigabytes of data to terabytes, from thousands of requests per second to millions, from seconds of response time to milliseconds, and this list can be continued. Until now, most of these problems have been solved…

In the modern world, network technologies are widespread in educational institutions . This fact makes it possible to switch from single-handed execution of programming tasks to collective ones. This report examines some methodological and technical details of the creation and implementation of…

The report will be about experience of project tools creating in restrictions imposed by corporate policies. It’s about automating the work of the project manager, the project team and their activities related to project management.

Cooperated with industry experts in the food industry, we managed to formalize the universal task for this industry. The solution was based on the algorithm already developed by our team for demand forecasting by machine learning methods, and experts suggested specific features that must be…

In this activity the participants will analyze and model most frequent conflict situations with clients of IT-companies and master new communication skills and techniques for managing agressive communication. The training is conducted by Andrei Maiboroda – experienced sales expert in the…

Nowadays many appliances, machines and services assist human on day-to-day basis. What if them would have intelligence to be self-maintaining, looking for supply needed, tune their service functions for a particular consumer given current context? The paper outlines directions for further…

Modern world, the world of project teams. A world of multitasking and unexpected business problems. At the presentation, we will consider the author’s method of conducting team coaching to create a vision and mission of the team, based on revealing the deepest value level of team members.

This work belongs to the area of high-level synthesis. It is dedicated to preliminary С program transformations before those programs are automatically translated into electronic circuit HDL description by a compiler. Transformations in questions are aimed at finding pipeline circuit that is…

The article describes transformation one of our projects – news widget application. In this article we describe details
about how we transform the vision and realization of product from mobile Android news widget into the newsreader, then in the voice assistant (skill), then into…

In 2016 Maxim Dorofeev made a talk about Reliable Scrum, a mixture of iterative Agile approach with critical chain project management (which is approach to project management for Theory of Constraints). In my talk I will show how do we use this metod in a team and what tools do we use for meet…

Our goal is to study the collection of all papers published on the OnePetro.org during one calendar year with the intention to figure out the most important hidden trends. Different text mining and clustering methods are used to answer the following very usual questions. What vital topics have…